Security & Ethics Flashcards
Hacking
Illegally gaining access to a computer system
Cracking
Illegally changing source code of a program so that it can be exploited for another
use
Spyware
User clicks on a link from an email or website
When clicked spyware is downloaded
Monitors users activity and relays it back to author
Keypresses can be analysed to find passwords
Common key logs allow password to be found
Viruses
Program that replicates itself
Deletes or corrupts files
Ransomware a new form of virus
Phishing
Fake email sent that locks legitimate
User clicks on link in the email
User redirected to fake website
Often used to try and steal financial details
How to avoid – Don’t click on links from unknown emails
Pharming
Malicious code stored on a computer
Redirects user to fake website to steal users data
How to avoid – check the URL is as expected
Cookies
Message given to browser by webserver
Stored in a text file
Stores detail about users preferences on a website
Message sent back to server each time that page is requested
Uses of Cookies
Enable logon information to be kept
Provide customized pages for the user
Enable target adverts
Enable one-click purchasing with shopping carts
Be able to distinguish between new and repeat visitors
Cause of Data Loss
Accidental Deletion Malicious – virus Hardware failure Software failure Natural disaster
Prevention of Data loss
Set data to read only
Use correct shut down procedures
Use correct procedures wen removing portable storage devices
Firewalls
Prevents unauthorized access Acts as a filter for incoming/outgoing data Checks data meets criteria Logs incoming and outgoing traffic Blocks access to specified IP addresses
Antivirus
Compares virus signature against a database of known virus signatures
Proxy Server
Keeps user IP address secret Prevents direct access to a webserver Filters traffic Speeds up traffic using CACHE Blocks selected IP addresses Helps prevent hacking of a webserver
Keeping Data Safe
Encrypt the data Password protection Virus checking software Physical methods Access rights
On Screen Security Methods
On screen keypad
Uses on-screen keypad
No keypresses so keylogging software won’t work
Numbers on key pad can be made random
Drop down boxes
Protects against key logging software
Stops key presses being recorded and relayed
Boxes can be placed in different locations each time to prevent screen capture